Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
5883b056534337cabeee2c58cdde6ccc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5883b056534337cabeee2c58cdde6ccc.exe
Resource
win10v2004-20231222-en
General
-
Target
5883b056534337cabeee2c58cdde6ccc.exe
-
Size
219KB
-
MD5
5883b056534337cabeee2c58cdde6ccc
-
SHA1
b6fe9b5f759619eb2dde2104df00fd70fbb68791
-
SHA256
3fcf39c1217361c05077b8bd1b5f9e0bdc922d908ed291f88d1b6d4094d0dcc2
-
SHA512
ecdb2c49df743d5484f1b9f4a3fe6897e42d0f81d8e234210be73d8d51a5f99024ba29c455424b80c0c8a2e4bfae349e4538c7fb522268273af7fb283724eb12
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8oveaMpjBFyT:o68i3odBiTl2+TCU/+verhuhuIp1
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 5883b056534337cabeee2c58cdde6ccc.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon2.ico 5883b056534337cabeee2c58cdde6ccc.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 5883b056534337cabeee2c58cdde6ccc.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 5883b056534337cabeee2c58cdde6ccc.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 5883b056534337cabeee2c58cdde6ccc.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 5883b056534337cabeee2c58cdde6ccc.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 5883b056534337cabeee2c58cdde6ccc.exe File created C:\Windows\bugMAKER.bat 5883b056534337cabeee2c58cdde6ccc.exe File created C:\Windows\winhash_up.exez 5883b056534337cabeee2c58cdde6ccc.exe File opened for modification C:\Windows\winhash_up.exez 5883b056534337cabeee2c58cdde6ccc.exe File created C:\Windows\winhash_up.exe 5883b056534337cabeee2c58cdde6ccc.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 5883b056534337cabeee2c58cdde6ccc.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 5883b056534337cabeee2c58cdde6ccc.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 5883b056534337cabeee2c58cdde6ccc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1116 wrote to memory of 2900 1116 5883b056534337cabeee2c58cdde6ccc.exe 28 PID 1116 wrote to memory of 2900 1116 5883b056534337cabeee2c58cdde6ccc.exe 28 PID 1116 wrote to memory of 2900 1116 5883b056534337cabeee2c58cdde6ccc.exe 28 PID 1116 wrote to memory of 2900 1116 5883b056534337cabeee2c58cdde6ccc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5883b056534337cabeee2c58cdde6ccc.exe"C:\Users\Admin\AppData\Local\Temp\5883b056534337cabeee2c58cdde6ccc.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5842f05e380d7f62191eba6a2a6d58bb4
SHA14bee14507b2b23925baa651ab43ada6299a57827
SHA25678c81508536db1fd3e4ffd771e9ce67c223076ef31491001f61ba2857eb05e53
SHA512be6623b1ae63c728f09c09b9f5bdc3958177bd96562d2ca3871d4f105e8f630313741a250d04574775b8f20fe7b20691a019e12fab62493e2d75590018b01e07